""" | |
The configuration file would look like this: | |
{ | |
"authority": "https://login.microsoftonline.com/organizations", | |
"client_id": "your_client_id came from https://learn.microsoft.com/entra/identity-platform/quickstart-register-app", | |
"scope": ["User.ReadBasic.All"], | |
// You can find the other permission names from this document | |
// https://docs.microsoft.com/en-us/graph/permissions-reference | |
} | |
You can then run this sample with a JSON configuration file: | |
python sample.py parameters.json | |
""" | |
import sys # For simplicity, we'll read config file from 1st CLI param sys.argv[1] | |
import json | |
import logging | |
import msal | |
# Optional logging | |
# logging.basicConfig(level=logging.DEBUG) # Enable DEBUG log for entire script | |
# logging.getLogger("msal").setLevel(logging.INFO) # Optionally disable MSAL DEBUG logs | |
def get_preexisting_rt_and_their_scopes_from_elsewhere(): | |
# Maybe you have an ADAL-powered app like this | |
# https://github.com/AzureAD/azure-activedirectory-library-for-python/blob/1.2.3/sample/device_code_sample.py#L72 | |
# which uses a resource rather than a scope, | |
# you need to convert your v1 resource into v2 scopes | |
# See https://docs.microsoft.com/azure/active-directory/develop/azure-ad-endpoint-comparison#scopes-not-resources | |
# You may be able to append "/.default" to your v1 resource to form a scope | |
# See https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent#the-default-scope | |
# Or maybe you have an app already talking to Microsoft identity platform v2, | |
# powered by some 3rd-party auth library, and persist its tokens somehow. | |
# Either way, you need to extract RTs from there, and return them like this. | |
return [ | |
("old_rt_1", ["scope1", "scope2"]), | |
("old_rt_2", ["scope3", "scope4"]), | |
] | |
# We will migrate all the old RTs into a new app powered by MSAL | |
config = json.load(open(sys.argv[1])) | |
app = msal.PublicClientApplication( | |
config["client_id"], authority=config["authority"], | |
# token_cache=... # Default cache is in memory only. | |
# You can learn how to use SerializableTokenCache from | |
# https://msal-python.readthedocs.io/en/latest/#msal.SerializableTokenCache | |
) | |
# We choose a migration strategy of migrating all RTs in one loop | |
for old_rt, scopes in get_preexisting_rt_and_their_scopes_from_elsewhere(): | |
result = app.acquire_token_by_refresh_token(old_rt, scopes) | |
if "error" in result: | |
print("Discarding unsuccessful RT. Error: ", json.dumps(result, indent=2)) | |
print("Migration completed") | |
# From now on, those successfully-migrated RTs are saved inside MSAL's cache, | |
# and becomes available in normal MSAL coding pattern, which is NOT part of migration. | |
# You can refer to: | |
# https://github.com/AzureAD/microsoft-authentication-library-for-python/blob/1.2.0/sample/device_flow_sample.py#L42-L60 | |